Open in app

Sign In

Write

Sign In

Gabriel Currie
Gabriel Currie

2 Followers

Home

About

Oct 16, 2021

Understanding the rise in human-operated ransomware attacks

The US Department of Justice has just released reporting on ransomware filings to its Financial Crimes Enforcement Network (FinCEN) from January to June 2021. The headline in this report is that FinCEN received more ransomware disclosures in the first six months of this year than in any one of the…

Ransomware

3 min read

Understanding the rise in human-operated ransomware attacks
Understanding the rise in human-operated ransomware attacks
Ransomware

3 min read


Jun 20, 2021

Ready for (nearly) anything: Five things to prepare for a cyber security incident

Every organisation has experienced, or will experience, a cyber security incident; depending on what you define the term as, most organisations have multiple every day. Increasingly punitive data protection regulation (such as the GDPR’s ability to fine organisations up to 4% of global turnover for data breaches) coupled with increasing…

Cyber

6 min read

Ready for (nearly) anything: Five things to prepare for a cyber security incident
Ready for (nearly) anything: Five things to prepare for a cyber security incident
Cyber

6 min read


Feb 21, 2021

Writing effective cyber incident response plans

How to assess and improve your cyber incident response plans — One of the biggest predictors of an organisation’s response to a cyber security incident is the quality of its cyber incident response plan. An effective plan can be a guide-rail for an experienced team, and a lifeline to the less experienced. …

Cyber

5 min read

Cyber

5 min read


Jan 7, 2021

Historic use of CYBERGATE to target Libyan rebels

A malware analysis walkthrough — Summary This blog post analyses a Portable Executable file first identified as being submitted by a user in Libya in 2011 to VirusTotal, identified by targeted searches to identify malware potentially linked to the Libyan Civil War. My analysis identified that the file is highly likely a variant of the Delphi-based…

Libya

10 min read

Historic use of CYBERGATE to target Libyan rebels
Historic use of CYBERGATE to target Libyan rebels
Libya

10 min read


Dec 8, 2020

The Russian government and human-operated ransomware

Assessing possible links between the Russian state and destructive “criminal” cyber attacks — At the end of November, a tweet rapidly made its way around the cyber security community, claiming to show evidence a number of prominent human-operated ransomware groups were “directly connected with the Russian government”. Regardless of the contents of this tweet, I don’t think there is enough evidence to…

Cybersecurity

4 min read

Cybersecurity

4 min read


Oct 1, 2020

The Libyan Electronic Army

Hacking for Gaddafi — The Libyan Electronic Army (LEA) was a hacking group operating during the First Libyan Civil War in support of, and directed by, the then-ruling Gaddafi regime. This post explores the history and capabilities of the LEA. Emergence of the LEA Small groups of pro-government hacking groups emerged in Libya during the 2000s at the…

Libya

4 min read

The Libyan Electronic Army
The Libyan Electronic Army
Libya

4 min read


Jul 21, 2019

Being a better boss

10 things I learned from Radical Candor — Kim Scott’s great book “Radical Candor” really impacted my view of leadership and management in business. Her core message is that managers (or leaders, bosses, etc) need to both care personally about the people they work with, and be prepared to challenge them directly. …

Management

2 min read

10 things I learned from Radical Candor
10 things I learned from Radical Candor
Management

2 min read


Feb 21, 2019

First response to cyber security incidents

Taking clear action in the first few hours of a crisis to minimise future risk — Incident response is hard, and the hardest part can often be in the first few hours where chaos reigns supreme and nobody really knows what’s going on or what they should be doing. Follow the seven steps for immediate incident response to provide clear direction, take appropriate action, and lay…

Cybersecurity

3 min read

First Response to Cyber Security Incidents
First Response to Cyber Security Incidents
Cybersecurity

3 min read


Dec 16, 2018

North Korean hackers

Understanding cyber operations in the hermit kingdom — The vast majority of North Korean hacking, or offensive computer network operations (CNO), comes directly under the control of the North Korean military. Formally known as the Korean People’s Army, or KPA, North Korea’s military is formed of five branches: the Ground Force, the Navy, the Air Force, the Strategic…

North Korea

7 min read

North Korean hackers
North Korean hackers
North Korea

7 min read


Aug 7, 2018

Anatomy of a cryptocurrency scam

This blog post analyses a really common cryptocurrency scam that has been widely reported on, and presents a number of open source intelligence tools that can be used to investigate such a scam. …

Blockchain

5 min read

Anatomy of a cryptocurrency scam
Anatomy of a cryptocurrency scam
Blockchain

5 min read

Gabriel Currie

Gabriel Currie

2 Followers

Head of Cyber Security at the UK Government’s @Cabinet_Office

Following
  • Netflix Technology Blog

    Netflix Technology Blog

  • Jigsaw

    Jigsaw

  • Uber Privacy & Security

    Uber Privacy & Security

  • Ryan Kazanciyan

    Ryan Kazanciyan

  • Will Oram

    Will Oram

See all (12)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech